Abstract. In this paper, we introduce a new class of double-block-length hash functions. Using the ideal cipher model, we prove that these hash functions, dubbed MJH, are asymptotically collision resistant up to O(2n(1−)) query complexity for any > 0 in the iteration, where n is the block size of the underlying blockcipher. When based on n-bit key blockciphers, our construction, being of rate 1/2, provides better provable security than MDC-2, the only known construction of a rate-1/2 double-length hash function based on an n-bit key blockcipher with non-trivial provable security. Moreover, since key scheduling is performed only once per message block for MJH, our proposal significantly outperforms MDC-2 in efficiency. When based on a 2n-...
© Springer-Verlag Berlin Heidelberg 1993. Collision resistant hash functions are an important basic ...
In this paper, we make attacks on DBL (Double-Block-Length) hash modes of block ciphers with $n$-bit...
In this paper we constructed a class of double length hash functions which are maximally secure i.e...
In this work the security of the rate-1 double block length hash functions, which based on a block c...
A double-block-length (DBL) hash mode of block ciphers, MJH has been proved to be collision-resistan...
This paper proposes a construction for collision resistant $2n$-bit hash functions, based on $...
This paper proposes a construction for collision resistant $2n$-bit hash functions, based on $...
© 2016, Springer Science+Business Media New York. The idea of double block length hashing is to cons...
The idea of double block length hashing is to construct a compression function on 2n bits using a bl...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit outpu...
In CRYPTO’89, Merkle presented three double-block-length hash functions based on DES. They are optim...
This paper considers hash functions based on block ciphers. It presents a new attack on the compress...
In this article, the security of double-block-length hash functions with the rate 1 is analyzed, who...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
© Springer-Verlag Berlin Heidelberg 1993. Collision resistant hash functions are an important basic ...
In this paper, we make attacks on DBL (Double-Block-Length) hash modes of block ciphers with $n$-bit...
In this paper we constructed a class of double length hash functions which are maximally secure i.e...
In this work the security of the rate-1 double block length hash functions, which based on a block c...
A double-block-length (DBL) hash mode of block ciphers, MJH has been proved to be collision-resistan...
This paper proposes a construction for collision resistant $2n$-bit hash functions, based on $...
This paper proposes a construction for collision resistant $2n$-bit hash functions, based on $...
© 2016, Springer Science+Business Media New York. The idea of double block length hashing is to cons...
The idea of double block length hashing is to construct a compression function on 2n bits using a bl...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit outpu...
In CRYPTO’89, Merkle presented three double-block-length hash functions based on DES. They are optim...
This paper considers hash functions based on block ciphers. It presents a new attack on the compress...
In this article, the security of double-block-length hash functions with the rate 1 is analyzed, who...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
© Springer-Verlag Berlin Heidelberg 1993. Collision resistant hash functions are an important basic ...
In this paper, we make attacks on DBL (Double-Block-Length) hash modes of block ciphers with $n$-bit...
In this paper we constructed a class of double length hash functions which are maximally secure i.e...